作者
Sonal Kumari, Karan Singh, Tayyab Khan, Mazeyanti Mohd Ariffin, Senthil Kumar Mohan, Dumitru Baleanu, Ali Ahmadian
发表日期
2023/4
期刊
Mobile Networks and Applications
卷号
28
期号
2
页码范围
767-781
出版商
Springer US
简介
Mobile phones are a valuable object in our daily life. With the acquisition of the latest technologies, their capabilities and demands increase day by day. However, acquiring the latest technologies makes mobile phones vulnerable to various security threats. Generally, people use passwords, pins, fingerprint locks, etc., to secure their mobile phones. Passwords and pins create so much burden for people always to remember their credentials. These traditional approaches are susceptible to brute force attacks, smudge attacks, and shoulder surfing attacks. Due to the difficulties mentioned above, researchers are leaning more towards continuous authentication. Therefore, this paper introduces an adaptive continuous authentication approach, a behavioral-based mobile authentication mechanism. In (Ehatisham-ul-Haq et al. J Netw Comput Appl 109:24–35, ), the authors achieved a good average accuracy of 97.95 …
引用总数